Security authentication system based on security computer

A security computer and security certification technology, which is applied in the field of security certification system based on security computer, can solve problems such as inaccurate security certification, and achieve the effect of increasing accuracy and security

Active Publication Date: 2020-06-19
COLLEGE OF TECH HUBEI ENG UNIV
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Through the setting of the determination module, compare the data calculated by the analysis module with the set preset value, and judge whether the user's image information has passed the security verification according to the comparison result, so as to solve the inaccurate The issue of security certification;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication system based on security computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] see figure 1 As shown, the present invention is a security authentication system based on a security computer, including a login module, a camera, an image recognition module, a database, a comparison unit, an analysis module, a judgment module and a display screen;

[0039] The login module is used to log in account information, the account information includes password data and account data, and transmits it to the comparison unit, and the database stores ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication system based on a security computer. The system comprises a login module, a camera, an image recognition module, a database, a comparison unit, an analysis module, a judgment module and a display screen, the login module is used for logging in account information; wherein the account information comprises password data and account data; the signalsare transmitted to the comparison unit; security account data, security password data, user mobile phone number data and security face information are stored in the database. According to the invention, the comparison unit is arranged; verifying the existence of the account number; password verification is carried out according to a verification result; and the analysis module analyzes the imageinformation of the user according to the comparison result of the comparison unit, thereby calculating the facial information of the user in the image information, accurately analyzing the image information and increasing the authenticity of the data, thereby increasing the persuasion of the data, increasing the accuracy of authentication and improving the working efficiency.

Description

technical field [0001] The invention relates to the technical field of computer authentication, in particular to a security authentication system based on a security computer. Background technique [0002] The announcement number is CN103326859B, a directory-based security authentication system and method. The directory-based security authentication system and method combines USBKey and smart card technology to research digital identity authentication, local system security, and multi-application expansion feasible solutions. Through the research on the PKI public key infrastructure system, combined with the existing directory identity authentication mechanism, a digital certificate authentication center is established, and the USBKey method is used as the user certificate storage medium to realize the identity authentication function of the user on the portal system and ensure user authentication. The security and confidentiality of information transmission in the process e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/00G06T7/62
CPCG06F21/32G06T7/62G06V40/168Y02D30/70
Inventor 陈衎李哲
Owner COLLEGE OF TECH HUBEI ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products